{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:12:53Z","timestamp":1771042373998,"version":"3.50.1"},"reference-count":52,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T00:00:00Z","timestamp":1763683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>The exponential growth of the Internet of Things (IoT) has increased the demand for robust security solutions that are tailored to devices with limited resources. This paper presents a systematic review of recent literature on lightweight encryption algorithms designed to meet this challenge. Through an analysis of 22 distinct ciphers, the study identifies the main algorithms proposed and catalogues the key metrics used for their evaluation. The most common performance criteria are execution speed, memory usage, and energy consumption, while security is predominantly assessed using techniques such as differential and linear cryptanalysis, alongside statistical tests such as the avalanche effect. However, the most critical finding is the profound lack of standardized frameworks for both performance benchmarking and security validation. This methodological fragmentation severely hinders objective, cross-study comparisons, making evidence-based algorithm selection a significant challenge and impeding the development of verifiably secure IoT systems.<\/jats:p>","DOI":"10.3390\/computers14120505","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:33:06Z","timestamp":1763739186000},"page":"505","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Lightweight Encryption Algorithms for IoT"],"prefix":"10.3390","volume":"14","author":[{"given":"Cl\u00e1udio","family":"Silva","sequence":"first","affiliation":[{"name":"Coimbra Institute of Engineering, Polytechnic University of Coimbra, Rua da Miseric\u00f3rdia, Lagar dos Corti\u00e7os, S\u00e3o Martinho do Bispo, 3045-093 Coimbra, Portugal"}]},{"given":"Nelson","family":"Ten\u00f3rio","sequence":"additional","affiliation":[{"name":"Cesumar Institute of Science, Technology and Innovation, Cesumar University, Avenida Guedner, 1610, B.7, Jardim Aclima\u00e7\u00e3o, Maring\u00e1 87013-100, Paran\u00e1, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-2011","authenticated-orcid":false,"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[{"name":"Coimbra Institute of Engineering, Polytechnic University of Coimbra, Rua da Miseric\u00f3rdia, Lagar dos Corti\u00e7os, S\u00e3o Martinho do Bispo, 3045-093 Coimbra, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"ref_1","unstructured":"(2025, May 01). Number of Internet of Things (IoT) Connections Worldwide from 2022 to 2023, with Forecasts from 2024 to 2033 (in Billions). Statista. Available online: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: A Survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Chataut, R., Phoummalayvane, A., and Akl, R. (2023). Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0. Sensors, 23.","DOI":"10.20944\/preprints202306.0002.v1"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/jcc.2015.35021","article-title":"Internet of Things (IoT): A Literature Review","volume":"3","author":"Madakam","year":"2015","journal-title":"J. Comput. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sadkhan, S.B., and Salman, A.O. (2018, January 14\u201315). A Survey on Lightweight-Cryptography Status and Future Challenges. Proceedings of the International Conference on Advances in Sustainable Engineering and Applications, ICASEA 2018-Proceedings, Kut, Iraq.","DOI":"10.1109\/ICASEA.2018.8370965"},{"key":"ref_6","first-page":"388","article-title":"Differential Power Analysis","volume":"Volume 1666","author":"Kocher","year":"1999","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1038\/nature23461","article-title":"Post-quantum cryptography","volume":"549","author":"Bernstein","year":"2017","journal-title":"Nature"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Santos, R.J., Bernardino, J., and Vieira, M. (2011, January 27\u201329). A Survey on Data Security in Data Warehousing: Issues, Challenges and Opportunities. Proceedings of the EUROCON 2011-International Conference on Computer as a Tool-Joint with Conftele, Lisbon, Portugal.","DOI":"10.1109\/EUROCON.2011.5929314"},{"key":"ref_9","first-page":"1","article-title":"Procedures for Performing Systematic Reviews","volume":"33","author":"Kitchenham","year":"2004","journal-title":"Keele UK Keele Univ."},{"key":"ref_10","first-page":"2349","article-title":"Orange: Data Mining Toolbox in Python","volume":"14","author":"Curk","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1007\/s12083-023-01559-w","article-title":"A Lightweight Block Encryption Algorithm for Narrowband Internet of Things","volume":"16","author":"Zhao","year":"2023","journal-title":"Peer Peer Netw. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/s11227-024-06707-4","article-title":"QLW: A Lightweight Block Cipher with High Diffusion","volume":"81","author":"Yue","year":"2025","journal-title":"J. Supercomput."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"25256","DOI":"10.1007\/s11227-024-06412-2","article-title":"GFSPX: An Efficient Lightweight Block Cipher for Resource-Constrained IoT Nodes","volume":"80","author":"Zhang","year":"2024","journal-title":"J. Supercomput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11625","DOI":"10.1007\/s12652-022-03726-y","article-title":"FPGA Implementation Novel Lightweight MBRISI Cipher","volume":"14","author":"Poojary","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"101928","DOI":"10.1016\/j.jksuci.2024.101928","article-title":"DRcipher: A Pseudo-Random Dynamic Round Lightweight Block Cipher","volume":"36","author":"Kuang","year":"2024","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Labio, R.D., and Festijo, E.D. (2020, January 17\u201318). D-PRESENT: A Lightweight Block Cipher with Dynamic Key-Dependent Substitution Boxes. Proceedings of the 2020 International Conference on Advanced Computer Science and Information Systems, ICACSIS, Depok, Indonesia.","DOI":"10.1109\/ICACSIS51025.2020.9263237"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Verma, A., and Thokchom, S. (2024, January 2\u20134). An Optimized SIMON Lightweight Image Encryption Algorithm for Internet of Things: Balancing Performance and Security. Proceedings of the 1st International Conference on Pioneering Developments in Computer Science and Digital Technologies, IC2SDT 2024-Proceedings, Delhi, India.","DOI":"10.1109\/IC2SDT62152.2024.10696534"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Cheng, J., Guo, S., and He, J. (2021, January 28\u201330). ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoT. Proceedings of the IEEE International Performance, Computing, and Communications Conference 2021, Austin, TX, USA.","DOI":"10.1109\/IPCCC51483.2021.9679401"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1609","DOI":"10.1007\/s11760-023-02831-5","article-title":"A Lightweight and Robust Block Cipher Algorithm for Real-Time Applications","volume":"18","author":"Hafsa","year":"2024","journal-title":"Signal Image Video Process."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., and Chakraborty, R. (2020, January 1\u20134). A Modified Lightweight PRESENT Cipher for IoT Security. Proceedings of the 2020 International Conference on Computer Science, Engineering and Applications, ICCSEA, Online.","DOI":"10.1109\/ICCSEA49143.2020.9132950"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"21727","DOI":"10.1109\/JIOT.2024.3376527","article-title":"ECLBC: A Lightweight Block Cipher with Error Detection and Correction Mechanisms","volume":"11","author":"Guo","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Qabajeh, L., Tahboub, R., and Abujoodeh, M. (2023, January 9\u201310). A New Lightweight AES for IoT. Proceedings of the 2023 International Conference on Information Technology: Cybersecurity Challenges for Sustainable Cities, ICIT 2023-Proceeding, Amman, Jordan.","DOI":"10.1109\/ICIT58056.2023.10226005"},{"key":"ref_23","first-page":"102897","article-title":"Towards an Ultra Lightweight Block Ciphers for Internet of Things","volume":"61","author":"Sliman","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Ghorashi, S.R., Zia, T., and Jiang, Y. (2020, January 23\u201327). Optimisation of Lightweight Klein Encryption Algorithm with 3 S-Box. Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops, Austin, TX, USA.","DOI":"10.1109\/PerComWorkshops48775.2020.9156189"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Longwani, P.C., Mendonca, I., and Aritsugi, M. (2022, January 19\u201320). A Lightweight Cryptographic Algorithm with a Multi-Purpose Encipher Key for IoT. Proceedings of the 10th International Japan-Africa Conference on Electronics, Communications, and Computations, JAC-ECC, Alexandria, Egypt.","DOI":"10.1109\/JAC-ECC56395.2022.10044020"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"70040","DOI":"10.1109\/ACCESS.2023.3292829","article-title":"End-to-End Encryption in Resource-Constrained IoT Device","volume":"11","author":"Alluhaidan","year":"2023","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3971","DOI":"10.1109\/JIOT.2024.3484394","article-title":"Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things","volume":"12","author":"Chaturvedi","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Vimalkumar, J., Babu, H.R., and Bhaskar, M. (2023, January 18\u201320). FPGA Implementation of Modified Lightweight 128-Bit AES Algorithm for IoT Applications. Proceedings of the 2023 IEEE International Symposium on Smart Electronic Systems, iSES, Ahmedabad, India.","DOI":"10.1109\/iSES58672.2023.00069"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Vaz, Y.S., Mattos, J.C.B., and Soares, R.I. (2023, January 12\u201327). Improving an Ultra Lightweight AES for IoT Applications. Proceedings of the 2023 IEEE World Forum on Internet of Things: The Blue Planet: A Marriage of Sea and Space, WF-IoT, Aveiro, Portugal.","DOI":"10.1109\/WF-IoT58464.2023.10539597"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ni, L.C., Ali, S., and Rashid, R.A. (2024, January 9\u201310). Design of Cryptography Algorithm for Data Security of a IoT System. Proceedings of the Conference Proceedings-IEEE International Conference on Advanced Telecommunication and Networking Technologies: Empowering Telecommunication Technologies for Sustainable Future, ATNT, Johor Bahru, Malaysia.","DOI":"10.1109\/ATNT61688.2024.10719294"},{"key":"ref_31","unstructured":"Bhagya, S., Jain, K., and Krishnan, P. (2024, January 4\u20136). Securing IoT Devices with Enhanced Tiny Encryption Algorithm. Proceedings of the 3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024-Proceedings, Pudukkottai, India."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"198646","DOI":"10.1109\/ACCESS.2020.3035375","article-title":"Extended Rectangle Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT","volume":"8","author":"Zakaria","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","unstructured":"(2012). Information Technology\u2014Security Techniques\u2014Lightweight Cryptography\u2014Part 1: General (Standard No. ISO\/IEC 29192-1:2012)."},{"key":"ref_34","unstructured":"Dang, Q.H. (2016). Report on Lightweight Cryptography, NIST Interagency. Internal Report (NISTIR) 8114."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/COMST.2017.2779824","article-title":"Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices","volume":"20","author":"Spreitzer","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_36","first-page":"251","article-title":"Electromagnetic Analysis: Concrete Results","volume":"Volume 2162","author":"Gandolfi","year":"2001","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_37","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","volume":"Volume 1109","author":"Kocher","year":"1996","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_38","first-page":"1","article-title":"Cache Attacks and Countermeasures: The Case of AES","volume":"Volume 3960","author":"Osvik","year":"2006","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_39","first-page":"13","article-title":"Template Attacks","volume":"Volume 2523","author":"Chari","year":"2003","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","article-title":"The Sorcerer\u2019s Apprentice Guide to Fault Attacks","volume":"94","author":"Choukri","year":"2006","journal-title":"Proc. IEEE"},{"key":"ref_41","first-page":"513","article-title":"Differential Fault Analysis of Secret Key Cryptosystems","volume":"Volume 1294","author":"Biham","year":"1997","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-662-48324-4_25","article-title":"Leakage Assessment Methodology a Clear Roadmap for Side-Channel Evaluations","volume":"9293","author":"Schneider","year":"2015","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"45","DOI":"10.46586\/tosc.v2017.i1.45-79","article-title":"LIZARD\u2014A Lightweight Stream Cipher for Power-Constrained Devices","volume":"2017","author":"Hamann","year":"2017","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Madushan, H., Salam, I., and Alawatugoda, J. (2022). A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses. Electronics, 11.","DOI":"10.3390\/electronics11244199"},{"key":"ref_45","unstructured":"(2025, November 05). Lightweight Cryptography|CSRC, Available online: https:\/\/csrc.nist.gov\/projects\/lightweight-cryptography\/performance-benchmarking."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.-K., Miller, C., and Moody, D. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology. NIST Interagency\/Internal Report (NISTIR) 8413-upd1.","DOI":"10.6028\/NIST.IR.8413"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3587037","article-title":"A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection","volume":"23","author":"Jati","year":"2024","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_48","unstructured":"(2025, November 10). CRYSTALS-Dilithium: Resources. Available online: https:\/\/pq-crystals.org\/dilithium\/resources.shtml."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Wang, B., Gu, X., and Yang, Y. (2020, January 19\u201322). Saber on ESP32. Proceedings of the International Conference on Applied Cryptography and Network Security, Virtual.","DOI":"10.1007\/978-3-030-57808-4_21"},{"key":"ref_50","first-page":"3","article-title":"Enabling FrodoKEM on Embedded Devices","volume":"2023","author":"Bos","year":"2023","journal-title":"Cryptol. Eprint Arch."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Magyari, A., and Chen, Y. (2025). Optimizing SPHINCS+ for Low-Power Devices. Electronics, 14.","DOI":"10.3390\/electronics14173460"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"26149","DOI":"10.1038\/s41598-025-08888-1","article-title":"Deep Learning-Based Profiling Side-Channel Attacks in SPECK Cipher","volume":"15","author":"Hameed","year":"2025","journal-title":"Sci. Rep."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/505\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:36:47Z","timestamp":1763739407000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,21]]},"references-count":52,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["computers14120505"],"URL":"https:\/\/doi.org\/10.3390\/computers14120505","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,21]]}}}